Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
1Terraria_1.4.4.9.zip
windows7-x64
7Terraria_1.4.4.9.zip
windows10-2004-x64
1Terraria_1...p3.zip
windows7-x64
1Terraria_1...p3.zip
windows10-2004-x64
1AlbumArtSmall.jpg
windows7-x64
3AlbumArtSmall.jpg
windows10-2004-x64
3Folder.jpg
windows7-x64
3Folder.jpg
windows10-2004-x64
3Re-Logic -...ay.mp3
windows7-x64
1Re-Logic -...ay.mp3
windows10-2004-x64
6Re-Logic -...ie.mp3
windows7-x64
1Re-Logic -...ie.mp3
windows10-2004-x64
6Re-Logic -...ht.mp3
windows7-x64
1Re-Logic -...ht.mp3
windows10-2004-x64
6Re-Logic -...en.mp3
windows7-x64
1Re-Logic -...en.mp3
windows10-2004-x64
6Re-Logic -...nd.mp3
windows7-x64
1Re-Logic -...nd.mp3
windows10-2004-x64
6Re-Logic -... 1.mp3
windows7-x64
1Re-Logic -... 1.mp3
windows10-2004-x64
6Re-Logic -...le.mp3
windows7-x64
1Re-Logic -...le.mp3
windows10-2004-x64
6Re-Logic -...on.mp3
windows7-x64
1Re-Logic -...on.mp3
windows10-2004-x64
6Re-Logic -...on.mp3
windows7-x64
1Re-Logic -...on.mp3
windows10-2004-x64
6Re-Logic -...ow.mp3
windows7-x64
1Re-Logic -...ow.mp3
windows10-2004-x64
6Re-Logic -... 2.mp3
windows7-x64
1Re-Logic -... 2.mp3
windows10-2004-x64
6Re-Logic -...ow.mp3
windows7-x64
1Re-Logic -...ow.mp3
windows10-2004-x64
6Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 17:32 UTC
Static task
static1
Behavioral task
behavioral1
Sample
Terraria_1.4.4.9.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Terraria_1.4.4.9.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Terraria_1.4.4.9/Bonus/terraria_soundtrack_vol_1_mp3.zip
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Terraria_1.4.4.9/Bonus/terraria_soundtrack_vol_1_mp3.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
AlbumArtSmall.jpg
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
AlbumArtSmall.jpg
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Folder.jpg
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Folder.jpg
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Re-Logic - Terraria Soundtrack - 01 Overworld Day.mp3
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Re-Logic - Terraria Soundtrack - 01 Overworld Day.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Re-Logic - Terraria Soundtrack - 02 Eerie.mp3
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Re-Logic - Terraria Soundtrack - 02 Eerie.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Re-Logic - Terraria Soundtrack - 03 Overworld Night.mp3
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Re-Logic - Terraria Soundtrack - 03 Overworld Night.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Re-Logic - Terraria Soundtrack - 04 Title Screen.mp3
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Re-Logic - Terraria Soundtrack - 04 Title Screen.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Re-Logic - Terraria Soundtrack - 05 Underground.mp3
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
Re-Logic - Terraria Soundtrack - 05 Underground.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Re-Logic - Terraria Soundtrack - 06 Boss 1.mp3
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Re-Logic - Terraria Soundtrack - 06 Boss 1.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Re-Logic - Terraria Soundtrack - 07 Jungle.mp3
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Re-Logic - Terraria Soundtrack - 07 Jungle.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Re-Logic - Terraria Soundtrack - 08 Corruption.mp3
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Re-Logic - Terraria Soundtrack - 08 Corruption.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Re-Logic - Terraria Soundtrack - 09 Underground Corruption.mp3
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
Re-Logic - Terraria Soundtrack - 09 Underground Corruption.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Re-Logic - Terraria Soundtrack - 10 The Hallow.mp3
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
Re-Logic - Terraria Soundtrack - 10 The Hallow.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Re-Logic - Terraria Soundtrack - 11 Boss 2.mp3
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
Re-Logic - Terraria Soundtrack - 11 Boss 2.mp3
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Re-Logic - Terraria Soundtrack - 12 Underground Hallow.mp3
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Re-Logic - Terraria Soundtrack - 12 Underground Hallow.mp3
Resource
win10v2004-20241007-en
General
-
Target
Re-Logic - Terraria Soundtrack - 08 Corruption.mp3
-
Size
6.4MB
-
MD5
1a6ceb9e0469dbdd2bbf0a675267c33a
-
SHA1
fe9fbd477207a17dce7066e14448419acc8d55b3
-
SHA256
6b828db640ed0ad2679d4cb0bb718b89e738db7e1404f99d09e641f25cd55063
-
SHA512
1f44c85b89e4c2f52a9be41aaf3db8e90f8038eaaef1a2d51c20d6ab3bb858ce59aca468ba29f745e3829c779a682c7bcc386866d6a375dc2fe98830a6e3329e
-
SSDEEP
196608:PLBqD0+RirJWIhas8gbG60QLMHZqx8pKQJNeL:PL0D0+orJhhnbntMHMxmzyL
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\Y: wmplayer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe -
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1045960512-3948844814-3059691613-1000\{6945149C-FCDA-4BFC-8D15-16904DCF037C} wmplayer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3688 wmplayer.exe Token: SeCreatePagefilePrivilege 3688 wmplayer.exe Token: SeShutdownPrivilege 2988 unregmp2.exe Token: SeCreatePagefilePrivilege 2988 unregmp2.exe Token: 33 1216 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1216 AUDIODG.EXE Token: SeShutdownPrivilege 3688 wmplayer.exe Token: SeCreatePagefilePrivilege 3688 wmplayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3688 wmplayer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3688 wrote to memory of 3380 3688 wmplayer.exe 85 PID 3688 wrote to memory of 3380 3688 wmplayer.exe 85 PID 3688 wrote to memory of 3380 3688 wmplayer.exe 85 PID 3380 wrote to memory of 2988 3380 unregmp2.exe 86 PID 3380 wrote to memory of 2988 3380 unregmp2.exe 86
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\Re-Logic - Terraria Soundtrack - 08 Corruption.mp3"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:4224
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x398 0x37c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1216
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request58.55.71.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request22.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request71.209.201.84.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request88.156.103.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request97.17.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestmusicmatch-ssl.xboxlive.comIN AResponsemusicmatch-ssl.xboxlive.comIN CNAMEmusicmatch-ssl.xboxlive.com.edgekey.netmusicmatch-ssl.xboxlive.com.edgekey.netIN CNAMEe87.dspb.akamaiedge.nete87.dspb.akamaiedge.netIN A2.17.4.7
-
POSThttps://musicmatch-ssl.xboxlive.com/cdinfo/GetMDRCD.aspx?locale=409&geoid=f4&version=12.0.19041.1266&userlocale=409&requestID=3C38DE7A-8844-4AD3-B1CF-F4577C735AC7wmplayer.exeRemote address:2.17.4.7:443RequestPOST /cdinfo/GetMDRCD.aspx?locale=409&geoid=f4&version=12.0.19041.1266&userlocale=409&requestID=3C38DE7A-8844-4AD3-B1CF-F4577C735AC7 HTTP/1.1
Accept: */*
User-Agent: Windows-Media-Player/12.0.19041.1288
Content-Type: text/xml
Accept-Encoding: gzip, deflate
Host: musicmatch-ssl.xboxlive.com
Content-Length: 452
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Length: 249
Content-Encoding: gzip
MS-CV: zo+hu3cR90Cn9TKHAoDTNA.0
X-Content-Type-Options: nosniff
Vary: Accept-Encoding
Date: Mon, 14 Oct 2024 17:40:35 GMT
Connection: keep-alive
-
Remote address:8.8.8.8:53Request7.4.17.2.in-addr.arpaIN PTRResponse7.4.17.2.in-addr.arpaIN PTRa2-17-4-7deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request98.117.19.2.in-addr.arpaIN PTRResponse98.117.19.2.in-addr.arpaIN PTRa2-19-117-98deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request83.210.23.2.in-addr.arpaIN PTRResponse83.210.23.2.in-addr.arpaIN PTRa2-23-210-83deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request19.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEax-0001.ax-msedge.netax-0001.ax-msedge.netIN A150.171.28.10ax-0001.ax-msedge.netIN A150.171.27.10
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360265014_1I9L6MC65FHDFQ9Z7&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.28.10:443RequestGET /th?id=OADD2.10239360265014_1I9L6MC65FHDFQ9Z7&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 815230
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 21CDC9F9F20F4423ABCB92FF582B2E95 Ref B: LON601060105025 Ref C: 2024-10-14T17:41:57Z
date: Mon, 14 Oct 2024 17:41:57 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340418570_1AILBHE008ZL9RHPC&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.28.10:443RequestGET /th?id=OADD2.10239340418570_1AILBHE008ZL9RHPC&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 195935
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 6479EE9B782F4EED8112CBB372A4F908 Ref B: LON601060105025 Ref C: 2024-10-14T17:41:57Z
date: Mon, 14 Oct 2024 17:41:57 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360265013_1UVY69FM05I7V26BP&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.28.10:443RequestGET /th?id=OADD2.10239360265013_1UVY69FM05I7V26BP&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 712130
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: A56ED6EEE60A4BA9B8B09B761C1BD71B Ref B: LON601060105025 Ref C: 2024-10-14T17:41:57Z
date: Mon, 14 Oct 2024 17:41:57 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360433542_1UJC4903W7XNIUU73&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.28.10:443RequestGET /th?id=OADD2.10239360433542_1UJC4903W7XNIUU73&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 193575
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 34F3B64726284FDD81F9E16B4F602786 Ref B: LON601060105025 Ref C: 2024-10-14T17:41:57Z
date: Mon, 14 Oct 2024 17:41:57 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340418569_13408TD3CSPQQLS8W&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.28.10:443RequestGET /th?id=OADD2.10239340418569_13408TD3CSPQQLS8W&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 843567
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 2FF0DD9B67114C4F8586D70E4613142A Ref B: LON601060105025 Ref C: 2024-10-14T17:41:57Z
date: Mon, 14 Oct 2024 17:41:57 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360433543_1F4HJPO10Z3VYH0SK&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.28.10:443RequestGET /th?id=OADD2.10239360433543_1F4HJPO10Z3VYH0SK&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 688476
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 0976A82889A64AF498C5B93DF18C06A3 Ref B: LON601060105025 Ref C: 2024-10-14T17:41:58Z
date: Mon, 14 Oct 2024 17:41:57 GMT
-
Remote address:8.8.8.8:53Request205.47.74.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request10.28.171.150.in-addr.arpaIN PTRResponse
-
2.17.4.7:443https://musicmatch-ssl.xboxlive.com/cdinfo/GetMDRCD.aspx?locale=409&geoid=f4&version=12.0.19041.1266&userlocale=409&requestID=3C38DE7A-8844-4AD3-B1CF-F4577C735AC7tls, httpwmplayer.exe1.6kB 5.0kB 11 11
HTTP Request
POST https://musicmatch-ssl.xboxlive.com/cdinfo/GetMDRCD.aspx?locale=409&geoid=f4&version=12.0.19041.1266&userlocale=409&requestID=3C38DE7A-8844-4AD3-B1CF-F4577C735AC7HTTP Response
200 -
150.171.28.10:443https://tse1.mm.bing.net/th?id=OADD2.10239360433543_1F4HJPO10Z3VYH0SK&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90tls, http278.0kB 3.6MB 1568 2600
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360265014_1I9L6MC65FHDFQ9Z7&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340418570_1AILBHE008ZL9RHPC&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360265013_1UVY69FM05I7V26BP&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360433542_1UJC4903W7XNIUU73&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340418569_13408TD3CSPQQLS8W&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Response
200HTTP Response
200HTTP Response
200HTTP Response
200HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360433543_1F4HJPO10Z3VYH0SK&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Response
200 -
1.2kB 6.9kB 15 13
-
1.2kB 6.9kB 15 13
-
972 B 6.9kB 11 13
-
1.0kB 6.9kB 12 13
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
58.55.71.13.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
22.160.190.20.in-addr.arpa
-
72 B 132 B 1 1
DNS Request
71.209.201.84.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
88.156.103.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
154.239.44.20.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
97.17.167.52.in-addr.arpa
-
73 B 176 B 1 1
DNS Request
musicmatch-ssl.xboxlive.com
DNS Response
2.17.4.7
-
67 B 127 B 1 1
DNS Request
7.4.17.2.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
50.23.12.20.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
98.117.19.2.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
83.210.23.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
19.229.111.52.in-addr.arpa
-
62 B 170 B 1 1
DNS Request
tse1.mm.bing.net
DNS Response
150.171.28.10150.171.27.10
-
71 B 157 B 1 1
DNS Request
205.47.74.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
10.28.171.150.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5063793e4ba784832026ec8bc3528f7f1
SHA1687d03823d7ab8954826f753a645426cff3c5db4
SHA256cb153cb703aea1ba1afe2614cffb086fa781646a285c5ac37354ee933a29cedd
SHA512225910c24052dfdf7fca574b12ecef4eb68e990167010f80d7136f03ac6e7faa33233685cbf37b38ee626bb22ff3afeee39e597080e429be3ec241fb30af40c6
-
Filesize
1024KB
MD5627ca585cc2d317a91e2b266c45833a9
SHA16bab91749945c1108f3df277db44296a3aaa5004
SHA2566eac0cf9652abef7549ae5a71548b5d8740e66f890d8629e16194b34e1ba1832
SHA512dd6134dc7252a53ed0df8122e5e714c1a34e53e4585188c1b61d3a709bdd077a0f6b2072d76919fd9a6e5b747694beebe8df06e18458e40035d1b3f881620f0e
-
Filesize
68KB
MD5e347afd08fbd603f188bc858d6a57b42
SHA130fde518b5f395c16834ddd7b18cfa7ef0f464d6
SHA25649de40ac228c2a7241c8708bf5433aad30d67b9632a15a5baf9df11f11bea527
SHA512f94a9717e1f6bb992fe0e6fdf7a34ad8d11d0bf453ffea3076f6f1b6c962ffcec7f762f8ba08e85eac3b26caf49545ba264e056158003ae1f474a1e1740458c0
-
Filesize
498B
MD590be2701c8112bebc6bd58a7de19846e
SHA1a95be407036982392e2e684fb9ff6602ecad6f1e
SHA256644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf
SHA512d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5dc17714abc8f59c191f8c3ae711fd4d6
SHA1e2926a4ec7d9668f87e1979e18b29f0d00b43f61
SHA2562f8883e4687cfa59aef235895af01a2d3308d5a6122ed5aa23b5aede7d588a8c
SHA512b3a501d9ccdb5292f390c54cea79f015f8f63ed42092e1f2e7ebcfc0a42e7891f17e60b199c01ffc4e2aa2331ea6fb54ce3d162d5791011fe9c7da9ffd6bbee1